informa

Security Monitoring

Cybercriminals Increasingly Employ Crypto-Mixers to Launder Stolen Profits
Crypto-mixer services are set to grow as ransomware and other cybercriminal enterprises increasingly lean into cryptocurrency, new research shows.
November 16, 2021
Crypto-mixer services are set to grow as ransomware and other cybercriminal enterprises increasingly lean into cryptocurrency, new research shows.
by Robert Lemos, Contributing Writer
November 16, 2021
4 min read
Article
3 Must-Know Technologies to Protect Your Hybrid Workforce
Zero-trust, SASE, and XDR have similar goals, but they differ in their approaches to protecting businesses and users.
November 15, 2021
Zero-trust, SASE, and XDR have similar goals, but they differ in their approaches to protecting businesses and users.
by Mary Blackowiak, Lead Product Marketing Manager, AT&T Cybersecurity
November 15, 2021
5 min read
Article
Open Source Project Aims to Detect Living-Off-the-Land Attacks
The machine learning classifier from Adobe can determine whether system commands are malicious and classify them using a variety of tags useful for security analysts.
November 12, 2021
The machine learning classifier from Adobe can determine whether system commands are malicious and classify them using a variety of tags useful for security analysts.
by Robert Lemos, Contributing Writer
November 12, 2021
4 min read
Article
Follow the Leaders: A Blueprint for Software Security Success
Organizations can study software security leaders and emulate their habits and initiatives in order to build a successful software security program of their own.
November 12, 2021
Organizations can study software security leaders and emulate their habits and initiatives in order to build a successful software security program of their own.
by Jacob Ewers, Principal Security Consultant, Synopsys Software Integrity Group
November 12, 2021
4 min read
Article
How Do I Know It's Time to Consider a SASE Migration?
The rapid shift to a hybrid workplace and accelerated adoption of new technologies means it's time to rethink networking security approaches.
November 11, 2021
The rapid shift to a hybrid workplace and accelerated adoption of new technologies means it's time to rethink networking security approaches.
by Shaila Shankar, SVP and General Manager, Cisco Cloud Network and Security
November 11, 2021
2 min read
Article
Edge Chat With Cisco Secure CTO TK Keanini on Achieving Better Security Outcomes
Now is the time for organizations to rethink their security strategies with a platform- and architecture-based approach in mind. Keanini explains.
November 09, 2021
Now is the time for organizations to rethink their security strategies with a platform- and architecture-based approach in mind. Keanini explains.
by Edge Editors, Dark Reading
November 09, 2021
8 min read
Article
Researchers Scan the Web to Uncover Malware Infections
Dozens of companies and universities regularly scan the Internet to gather data on connected devices, but some firms are looking deeper to uncover the extent of detectable malware infections.
November 03, 2021
Dozens of companies and universities regularly scan the Internet to gather data on connected devices, but some firms are looking deeper to uncover the extent of detectable malware infections.
by Robert Lemos, Contributing Writer
November 03, 2021
4 min read
Article
Attackers Flaunt Remote Access Credentials, Threaten Supply Chain
Attackers advertise access to computers within shipping and logistics companies as the global supply chain struggles to meet post-COVID demands.
November 02, 2021
Attackers advertise access to computers within shipping and logistics companies as the global supply chain struggles to meet post-COVID demands.
by Robert Lemos, Contributing Writer
November 02, 2021
4 min read
Article
Cybercriminals Take Aim at Connected Car Infrastructure
While car makers are paying more attention to cybersecurity, the evolution of automobiles into "software platforms on wheels" and the quick adoption of new features has put connected cars in the crosshairs.
October 29, 2021
While car makers are paying more attention to cybersecurity, the evolution of automobiles into "software platforms on wheels" and the quick adoption of new features has put connected cars in the crosshairs.
by Robert Lemos, Contributing Writer
October 29, 2021
4 min read
Article
Removing Friction for the Enterprise With Trusted Access
Our work lives are supposed to be simpler and easier because of technology. At least that’s the promise.
October 20, 2021
Our work lives are supposed to be simpler and easier because of technology. At least that’s the promise.
by Ash Devata, General Manager, Cisco Zero Trust and Duo Security
October 20, 2021
4 min read
Article
Query.ai Closes $15M Series A for Security Investigations Tool
The funding will support product development for Query.AI's browser-based security investigations tool.
October 19, 2021
The funding will support product development for Query.AI's browser-based security investigations tool.
by Dark Reading Staff, Dark Reading
October 19, 2021
2 min read
Article
VirusTotal Shares Data on Ransomware Activity
Google's online malware scanning service analyzed 80 million ransomware samples that were uploaded in the past year-and-a-half.
October 13, 2021
Google's online malware scanning service analyzed 80 million ransomware samples that were uploaded in the past year-and-a-half.
by Kelly Jackson Higgins, Executive Editor
October 13, 2021
2 min read
Article
Most Large Enterprises Fail to Protect Their Domain Names
Of the largest 2,000 companies in the world, 81% fail to take simple security measures, such as locking their domain with the registrar, leaving them open to domain shenanigans.
September 28, 2021
Of the largest 2,000 companies in the world, 81% fail to take simple security measures, such as locking their domain with the registrar, leaving them open to domain shenanigans.
by Robert Lemos, Contributing Writer
September 28, 2021
4 min read
Article
Endpoint Still a Prime Target for Attack
A vast majority of security professionals surveyed think any exploit will start with the endpoint.
September 24, 2021
A vast majority of security professionals surveyed think any exploit will start with the endpoint.
by Dark Reading Staff, Dark Reading
September 24, 2021
2 min read
Article
Purchasing Managed Security Services: Strategies for Client References
There's a scarcity of customers using managed security services who are willing to talk to others about their experiences. Here's how to work with your vendor(s) to leverage their customers' experiences and hard-won wisdom.
September 15, 2021
There's a scarcity of customers using managed security services who are willing to talk to others about their experiences. Here's how to work with your vendor(s) to leverage their customers' experiences and hard-won wisdom.
by Bob Blakley, Senior Director, Global Security Services
September 15, 2021
5 min read
Article